The PC's which has been used to generate Root CA, Sub CA’s and in the PC were the entity certificate has been downloaded should also have uniform date & time settings.

10. While Running a Batch File the following Error occurs, What is the solution?

This error Occurs when a different version of Java Run time is used. Check whether you have installed the Correct Version of Java Run time 1.5.0

11. In RSA / RC4 / Md5 what is the strength of the Key which has been generated?

The Strength of RC4,RSA,SDES,3SDES is 8 – bit and for MD5 it is 128bit.

12. In Trojan horse Experiment the following error is occurrs?

Check whether a "chk.txt" file is been created in C:

Check whether the cricket folder is placed in C:

Check whether the IP address in the configuration.txt file matches the IP address of the machine were the Trojan Server is running.

13. Not able to download Trojan server / Trojan client /Mail Sniffer/ Mail Client applications from the Exercise page by using Internet Explorer?

Disable the popup blocker toolbar form the browser

Try to download the application by press the "Ctrl" key in the keyboard

14. Not able to see any captured data in the mail sniffer window when we try to sniff the encrypted message sent by using the mail client application?

Click the Binary button in the mail sniffer experiment window. The Binary Data is stored as mailsniffer_log.dat, This file can be located in the mailsinffer folder. The file content can be viewed by using a notepad.

15. Spoofing System requirements?

IP Spoofing Exercise is compatible to Linux platform only.

MAC spoofing is compatible to Windows 2000 /sp4 only.

16. Not able to perform MAC spoofing experiment & how to realize the result?

MAC spoofing should be performed with in the same network say i.e. both the target machine and the host should be connected to the same network.

Results of the spoofing experiment can be realized by using ethereal application in the target machine.

Check whether the firewall is been turned off.

Check whether WinPcap Version 3.1beta3 is been installed.

17. Not able to perform IP spoofing experiment & how to realize the result?

IP spoofing should be performed across the network say i.e. the target machine should connected to 10 series & the host machine is connected to the 2 series.

Results of the spoofing experiment can be realized by using ethereal application in the target machine

Check whether the firewall is been turned off

18. The connection time out error occurs in Trojan horse experiment?

Check whether the IP address in the configuration.txt file matches the IP address of the machine were the Trojan Server is running.